3v4l.org

run code in 300+ PHP versions simultaneously
<?php $s = 'testaa1-_as32เชื่อว่าต้องมีหลายคนที่ไม่ค่อยได้'; if (preg_match('~^[\w\p{Thai}-]+$~u', $s)) { echo "Valid!"; } else { echo "Invalid!"; } $s = '@.testaa1-_as32เชื่อว่าต้องมีหลายคนที่ไม่ค่อยได้'; if (preg_match('~^[\w\p{Thai}-]+$~u', $s)) { echo "\nValid!"; } else { echo "\nInvalid!"; }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 6, Position 2 = 8
Branch analysis from position: 6
1 jumps found. (Code = 42) Position 1 = 9
Branch analysis from position: 9
2 jumps found. (Code = 43) Position 1 = 15, Position 2 = 17
Branch analysis from position: 15
1 jumps found. (Code = 42) Position 1 = 18
Branch analysis from position: 18
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 17
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 8
2 jumps found. (Code = 43) Position 1 = 15, Position 2 = 17
Branch analysis from position: 15
Branch analysis from position: 17
filename:       /in/4hB9e
function name:  (null)
number of ops:  19
compiled vars:  !0 = $s
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'testaa1-_as32%E0%B9%80%E0%B8%8A%E0%B8%B7%E0%B9%88%E0%B8%AD%E0%B8%A7%E0%B9%88%E0%B8%B2%E0%B8%95%E0%B9%89%E0%B8%AD%E0%B8%87%E0%B8%A1%E0%B8%B5%E0%B8%AB%E0%B8%A5%E0%B8%B2%E0%B8%A2%E0%B8%84%E0%B8%99%E0%B8%97%E0%B8%B5%E0%B9%88%E0%B9%84%E0%B8%A1%E0%B9%88%E0%B8%84%E0%B9%88%E0%B8%AD%E0%B8%A2%E0%B9%84%E0%B8%94%E0%B9%89'
    4     1        INIT_FCALL                                               'preg_match'
          2        SEND_VAL                                                 '%7E%5E%5B%5Cw%5Cp%7BThai%7D-%5D%2B%24%7Eu'
          3        SEND_VAR                                                 !0
          4        DO_ICALL                                         $2      
          5      > JMPZ                                                     $2, ->8
    5     6    >   ECHO                                                     'Valid%21'
          7      > JMP                                                      ->9
    7     8    >   ECHO                                                     'Invalid%21'
   10     9    >   ASSIGN                                                   !0, '%40.testaa1-_as32%E0%B9%80%E0%B8%8A%E0%B8%B7%E0%B9%88%E0%B8%AD%E0%B8%A7%E0%B9%88%E0%B8%B2%E0%B8%95%E0%B9%89%E0%B8%AD%E0%B8%87%E0%B8%A1%E0%B8%B5%E0%B8%AB%E0%B8%A5%E0%B8%B2%E0%B8%A2%E0%B8%84%E0%B8%99%E0%B8%97%E0%B8%B5%E0%B9%88%E0%B9%84%E0%B8%A1%E0%B9%88%E0%B8%84%E0%B9%88%E0%B8%AD%E0%B8%A2%E0%B9%84%E0%B8%94%E0%B9%89'
   11    10        INIT_FCALL                                               'preg_match'
         11        SEND_VAL                                                 '%7E%5E%5B%5Cw%5Cp%7BThai%7D-%5D%2B%24%7Eu'
         12        SEND_VAR                                                 !0
         13        DO_ICALL                                         $4      
         14      > JMPZ                                                     $4, ->17
   12    15    >   ECHO                                                     '%0AValid%21'
         16      > JMP                                                      ->18
   14    17    >   ECHO                                                     '%0AInvalid%21'
   15    18    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
165.93 ms | 1401 KiB | 15 Q